On Fri, Sep 26, 2014 at 4:08 PM, Jonas Wagner <[email protected]> wrote: > Also, this might be very interesting for the stack, too. I think even a > slightly randomized stack layout (through random redzone sizes or variable > reordering) could make it harder to write exploits. I know ASan is a > debugging tool more than a security hardening tool, but I'd still find this > interesting.
AFAIK KAsan people experimented with something like this to get cheap probabilistic UAR detection. -Y -- You received this message because you are subscribed to the Google Groups "address-sanitizer" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/d/optout.
